Results 271 to 280 of about 1,173,800 (295)
Some of the next articles are maybe not open access.

Robustness analysis of classical and fuzzy decision trees under adversarial evasion attack

Applied Soft Computing, 2021
P. Chan   +4 more
semanticscholar   +1 more source

A Transfer Attack to Image Watermarks

International Conference on Learning Representations
Watermark has been widely deployed by industry to detect AI-generated images. The robustness of such watermark-based detector against evasion attacks in the white-box and black-box settings is well understood in the literature. However, the robustness in
Yuepeng Hu   +3 more
semanticscholar   +1 more source

MTDroid: A Moving Target Defense-Based Android Malware Detector Against Evasion Attacks

IEEE Transactions on Information Forensics and Security
Machine learning (ML) has been widely adopted for Android malware detection to deal with serious threats brought by explosive malware attacks. However, it has been recently proven that ML-based detection systems exhibit inherent vulnerabilities to ...
Yuyang Zhou   +4 more
semanticscholar   +1 more source

EAGLE: Evasion Attacks Guided by Local Explanations Against Android Malware Classification

IEEE Transactions on Dependable and Secure Computing
With machine learning techniques widely used to automate Android malware detection, it is important to investigate the robustness of these methods against evasion attacks.
Zhan Shu, Guanhua Yan
semanticscholar   +1 more source

Evasion Attacks Against Statistical Code Obfuscation Detectors

2017
In the domain of information security, code obfuscation is a feature often employed for malicious purposes. For example there have been quite a few papers reporting that obfuscated JavaScript frequently comes with malicious functionality such as redirecting to external malicious websites. In order to capture such obfuscation, a class of detectors based
Jiawei Su   +2 more
openaire   +1 more source

Intra-Section Code Cave Injection for Adversarial Evasion Attacks on Windows PE Malware File

Computers & security
Windows malware is predominantly available in cyberspace and is a prime target for deliberate adversarial evasion attacks. Although researchers have investigated the adversarial malware attack problem, a multitude of important questions remain unanswered,
Kshitiz Aryal   +3 more
semanticscholar   +1 more source

Evasion Attacks in Smart Power Grids: A Deep Reinforcement Learning Approach

Consumer Communications and Networking Conference
In smart power grids, certain customers are motivated by financial gains to manipulate electricity consumption data, aiming to reduce their bills. Despite the development of machine learning-based detectors, these systems remain vulnerable to evasion ...
Ahmed T. El-Toukhy   +4 more
semanticscholar   +1 more source

Securing Autonomous Vehicles Visual Perception: Adversarial Patch Attack and Defense Schemes With Experimental Validations

IEEE Transactions on Intelligent Vehicles
Autonomous vehicles (AVs) heavily depend on machine learning-based algorithms for the purpose of environmental perception. However, extensively utilized deep learning-based visual perception methods are susceptible to adversarial visual sensor attacks ...
Jingguo Liang   +4 more
semanticscholar   +1 more source

A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack

Computers & security, 2023
Jiaxuan Geng   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy